Hi [[ session.user.profile.firstName ]]
Sort by:
    • Zscaler ThreatLabz dissects the latest SSL security attacks
      Zscaler ThreatLabz dissects the latest SSL security attacks Deepen Desai, Senior Director of Security Research Zscaler Recorded: Dec 5 2017 9:45 pm UTC 50 mins
    • The occurrence of SSL-based threats are continuing to rise. Hackers are getting more and more creative in how they deliver threats, which creates new inspection challenges. Attend this webcast to discuss the latest attack trends, and best practices you can employ within your Zscaler installation to bolster your security.

      Please join Deepen Desai, Senior Director of Security Research for Zscaler ThreatLabz as he discusses all the current trends in ransomware and malware. You’ll get to see inside the latest threats, so you can learn how to mitigate risk better and keep your users safe.

      You will learn:

      - The recent attack trends Zscaler Threatlabz has been tracking across the Zscaler Cloud.
      - What Innovative techniques hackers are using in today’s threat landscape.
      - Why inspecting SSL is an important step in finding the latest malware strains.
      - The best practices and security recommendations to you can use to defend against multi-stage attacks.

      Read more >
    • SSL Best Practices: Keys, Certificates and Advanced Certificates
      SSL Best Practices: Keys, Certificates and Advanced Certificates Mark Giannotti Recorded: Jun 9 2017 3:50 pm UTC 66 mins
    • SSL certificates secure ecommerce, communications and private information passed from browser to Web server and between servers. Join us for a complimentary webinar that covers key best practices for securely deploying SSL certificates for your specific environment. We will discuss:

      - Private Keys for Quality Protection: Learn how to use private keys, a key factor in determining the quality of protection provided by SSL.
      - Cater SSL For Your Environment: Discuss importance of selecting the appropriate Certification Authority (CA) and certificate type.
      - Troubleshoot Your SSL Problems: Explore how advanced certificates can be used to help solve problems in your SSL applications.

      Read more >
    • The Evolution of SSL/TLS and Browser Compliance Requirements in 2017
      The Evolution of SSL/TLS and Browser Compliance Requirements in 2017 Dathan Demone, Entrust Datacard Recorded: Jun 21 2017 3:00 pm UTC 57 mins
    • SSL/TLS Industry requirements are changing at an unprecedented pace. Over the last couple of years, new requirements have been passed down by the CA and browser community to help further solidify the security practices around obtaining and using SSL/TLS and other types of publicly trusted certificates. Over the next 12 months, more important changes are being introduced to continue that trend. Join Dathan Demone, Product Manager at Entrust Datacard, who will discuss both past and future changes that will have a major impact on all certificate subscribers. In this Webinar, we will discuss topics such as:

      • New changes coming to browsers and how they notify end users about the proper use of SSL/TLS on all web pages
      • Changes to certificate lifetime policies and verification rules that are being introduced in 2017
      • New requirements around Certificate Transparency that are being introduced in October, 2017
      • Updates to recommended security best practices and new vulnerabilities in the world of SSL/TLS
      • Certificate Authority Authorization and how this can be used to protect your organization against fraud

      Read more >
    • Cybersecurty Webinar – Solving the challenges of SSL decryption in Education
      Cybersecurty Webinar – Solving the challenges of SSL decryption in Education Jamie Jennrich Regional Manager for Education and Jon Wood, Systems Engineer at Palo Alto Networks Recorded: May 24 2018 2:30 pm UTC 32 mins
    • Secure Sockets Layer (SSL) (and its successor Transport Layer Security (TLS)) is an encryption protocol that is designed to protect the privacy and security of sensitive communications across a network, such as the Internet.

      The use of SSL encryption is rapidly increasing. In 2017, approximately 50% of web traffic was secured by the protocol and this is expected to rise to 80% by 2019 according to Gartner. Currently most major websites including Google, Facebook and Wikipedia, enforce encryption and are using SSL across their sites (HTTPS sites).

      Join Jamie Jennrich, Regional Manager for Education and Jon Wood, Systems Engineer at Palo Alto Networks for an exclusive Cybersecurity Webinar ‘Solving the challenges of SSL decryption in Education’ on May 24th at 3.30 p.m. (BST) During this event they will discuss the difficult tension in education today between allowing students and staff easy and open access to information while ensuring their working environment is secure and safe, protected from growing cyber threats.

      Attend this webinar to understand:

      - SSL, its benefits and growth
      - Challenges of encryption in Education
      - How Palo Alto Networks can provide visibility and control across encrypted SSL channels

      Read more >
    • Regain control of your SSL Environment
      Regain control of your SSL Environment Alan Goh & Helen Lew Recorded: Feb 16 2017 4:00 am UTC 26 mins
    • With numerous certificates sited across multiple locations and geographies, ensuring continuity and compliance has become a time-consuming, costly, and risky business for enterprises. In this 30-45 minute webinar you'll learn how Symantec Discovery can help to ensure continuity and compliance, and deliver peace of mind when it comes to your SSL/TLS certificate real estate.

      - Discover your entire certificate infrastructure
      - Instantly assess every certificate for security risks
      - Reduce your risk of being non-compliant
      - Learn about our free trial

      Read more >
    • SonicWall Under the Hood - DPI-SSL Certificate Deployment Deep Dive
      SonicWall Under the Hood - DPI-SSL Certificate Deployment Deep Dive Ken Dang & Rob Krug Recorded: Jan 23 2018 7:00 pm UTC 62 mins
    • Managing certificate deployment and certificate pinning are among the top challenges when implementing deep inspection of SSL and TLS certificates on a next-generation firewall.

      Join us for a technical deep-dive webcast and demo to learn best practices to a successful SonicWall Deep Packet Inspection of SSL (DPI-SSL) service implementation. This in-depth session will:

      • Help size the firewall accurately for DPI-SSL service
      • Provide multiple methods for certificate deployment
      • Offer guidance for certificate-pinning
      • Educate users on the OS certificate store
      • Explain how to establish trust with devices in BYOD environments

      Read more >
    • Why You Need SSL/TLS Visibility
      Why You Need SSL/TLS Visibility Danny Luedke, Product Marketing Manager Recorded: Aug 18 2017 7:00 pm UTC 52 mins
    • As SSL becomes the de facto standard for all Internet traffic, network security solutions are going blind. Cyber criminals are leveraging encryption to their advantage ‘phoning-home’ to SSL/TLS websites, knowingly bypassing traditional security solutions that don’t decrypt and inspect their traffic.

      In a recent IDC study commissioned by F5, 90% of respondents cited significant concern over the ability to inspect encrypted traffic and 85% say outbound encrypted traffic will increase significantly and negatively impact their security strategies over the next 2 years.

      View this on demand webinar to learn more about:
      •The rise of SSL traffic and the risks to your business
      •How to gain visibility into your SSL/TLS traffic
      •How F5 addresses performance concerns
      •How F5 solutions easily integrate with other industry leading security solutions

      Read more >
    • The Evolution of SSL/TLS and Browser Compliance Requirements in 2017
      The Evolution of SSL/TLS and Browser Compliance Requirements in 2017 Dathan Demone, Entrust Datacard Recorded: Jul 25 2017 11:00 pm UTC 57 mins
    • SSL/TLS Industry requirements are changing at an unprecedented pace. Over the last couple of years, new requirements have been passed down by the CA and browser community to help further solidify the security practices around obtaining and using SSL/TLS and other types of publicly trusted certificates. Over the next 12 months, more important changes are being introduced to continue that trend. Join Dathan Demone, Product Manager at Entrust Datacard, who will discuss both past and future changes that will have a major impact on all certificate subscribers. In this Webinar, we will discuss topics such as:

      • New changes coming to browsers and how they notify end users about the proper use of SSL/TLS on all web pages
      • Changes to certificate lifetime policies and verification rules that are being introduced in 2017
      • New requirements around Certificate Transparency that are being introduced in October, 2017
      • Updates to recommended security best practices and new vulnerabilities in the world of SSL/TLS
      • Certificate Authority Authorization and how this can be used to protect your organization against fraud

      Read more >
    • SSL Best Practices: Server Configuration & Enhanced Security
      SSL Best Practices: Server Configuration & Enhanced Security Mark Giannotii, Entrust Recorded: Jun 28 2017 5:55 pm UTC 61 mins
    • The best way to mitigate security vulnerabilities on your web server is to configure that server in the most reliable way. Join us for our SSL Best Practices webinar and learn to stop threats from the start. This complimentary webinar will explore server configuration and server enhancement. We will discuss how secure server configuration for SSL protects your sites from online threats and:

      •Implement the Proper Configuration: Learn which SSL server configuration options mitigate against known problems
      •Enhanced Security Features: Discuss enhanced security features and the benefits they provide
      •Tools For Configuration: Get a demonstration of available services that will help administrators assess the security configuration of their SSL web server

      Read more >
    • SSL Best Practices: Keys, Certificates and Advanced Certificates
      SSL Best Practices: Keys, Certificates and Advanced Certificates Mark Giannotii, Entrust Recorded: Jun 28 2017 6:00 pm UTC 66 mins
    • Phishing attacks are dangerous to your customers and could be detrimental to your brand. Securing your website and protecting your business are the cornerstone of Entrust SSL Best Practices. Join us for a complimentary webinar that covers key best practices for protecting your domain phishing attacks against the customer’s clientele and unsuspecting internet users.

      We will discuss:

      •The Definition of a Trusted CA: Learn what controls a trusted Certificate Authority (CA) has in place to ensure that unauthorized administrator cannot acquire a certificate for your organization’s brand name.
      •Domain Protection: Discuss how you can prevent another CA from issuing certificates for your domain and detect previously issued certificates.
      •Domain and Brand Reputation: Explore subjects such as certificate aSSL certificates secure ecommerce, communications and private information passed from browser to Web server and between servers. Join us for a complimentary webinar that covers key best practices for securely deploying SSL certificates for your specific environment. We will discuss:
      •Private Keys for Quality Protection: Learn how to use private keys, a key factor in determining the quality of protection provided by SSL.
      •Cater SSL For Your Environment: Discuss importance of selecting the appropriate Certification Authority (CA) and certificate type.
      •Troubleshoot Your SSL Problems: Explore how advanced certificates can be used to help solve problems in your SSL applications.
      transparency, Microsoft’s certificate reputation, HTTP public key pinning and certification authority authorization.

      Read more >
    • How to Gain SSL / TLS Visibility and Control
      How to Gain SSL / TLS Visibility and Control David Maclean – Systems Engineer, F5 Networks Recorded: Jun 21 2017 11:00 am UTC 67 mins
    • As SSL/TLS becomes the standard for all Internet traffic, security inspection solutions are going blind. Cyber criminals are leveraging encryption to their advantage, bypassing traditional security tools that don’t decrypt and inspect traffic ‒ less than half of all network security appliances are inspecting SSL/TLS traffic. Join us for this webinar to learn more about:

      - Global encryption trends and how to improve your crypto posture
      - Which attacks are concealing malware within encrypted tunnels
      - How to gain visibility into your SSL/TLS traffic
      - How to address SSL/TLS performance concerns

      By watching this webinar, your personal details will be shared with F5 and treated in accordance with the F5 Privacy Notice (https://f5.com/about-us/policies/privacy-policy).

      Read more >
    • So gewinnen Sie Einblick und Kontrolle bei SSL/TLS
      So gewinnen Sie Einblick und Kontrolle bei SSL/TLS Patrick Zoller - Systems Engineer, F5 Networks Recorded: Jun 30 2017 10:00 am UTC 67 mins
    • Mit der Entwicklung von SSL/TLS zum Standard für jedweden Internet-Traffic erblinden Sicherheitslösungen. Cyber-Kriminelle setzen Verschlüsselung zu ihrem eigenen Vorteil ein und umgehen traditionelle Security-Lösungen, die den Traffic nicht entschlüsseln und untersuchen. Weniger als die Hälfte aller Netzwerksicherheits-Appliances inspizieren SSL/TLS-Traffic. Nehmen Sie an unserem Webinar teil und erfahren Sie mehr über:

      - Globale Verschlüsselungstrends und wie Sie Ihre Krypto-Strategie verbessern
      - Attacken, die Malware in Verschlüsselungstunneln verbergen
      - Wie Sie Einblick in Ihren SSL/TLS-Traffic erhalten
      - Was Sie bei Performance-Problemen mit SSL/TLS tun können

      Wenn Sie sich dieses Webinar ansehen, werden Ihre persönlichen Daten mit F5 geteilt und in Übereinstimmung mit den F5 Datenschutzrichlinien behandelt (https://f5.com/about-us/policies/privacy-policy).

      Read more >
    • Jak zyskać dostęp do danych i kontrolę w ruchu SSL/TLS
      Jak zyskać dostęp do danych i kontrolę w ruchu SSL/TLS Maciej Iwanicki - Systems Engineer, F5 Networks Recorded: Jun 27 2017 10:00 am UTC 71 mins
    • SSL/TLS staje się standardem w całym ruchu internetowym, dlatego rozwiązania z zakresu kontroli i bezpieczeństwa ślepną. Cyberprzestępcy wykorzystują szyfrowanie do swoich celów, obchodząc tradycyjne narzędzia zabezpieczające, które nie rozszyfrowują i nie kontrolują ruchu — mniej niż połowa spośród wszystkich urządzeń zabezpieczających sieć kontroluje ruch SSL/TLS. Weź udział w naszym seminarium internetowym, aby lepiej poznać następujące zagadnienia:

      - Globalne trendy w szyfrowaniu oraz możliwości usprawnienia systemu kryptograficznego
      - Przy których atakach złośliwe oprogramowanie ukrywane jest w szyfrowanych tunelach?
      - Jak zyskać dostęp do danych w ruchu SSL/TLS?
      - Jak podejść do kwestii związanych z działaniem protokołu SSL/TLS?

      Oglądając webinar wyrażasz zgodę na udostępnienie Twoich danych firmie F5. Dane będą traktowane zgodnie Polityką Prywatności F5 (https://f5.com/about-us/policies/privacy-policy).

      Read more >
    • Cómo lograr la visibilidad y el control de SSL/TLS
      Cómo lograr la visibilidad y el control de SSL/TLS Raúl Flores – Senior Systems Engineer, F5 Networks Recorded: Jun 28 2017 10:00 am UTC 48 mins
    • A consecuencia de que SSL/TLS se está convirtiendo en el estándar para todo el tráfico de Internet, las soluciones de inspección de seguridad funcionan sin control. Los delincuentes cibernéticos aprovechan el cifrado en su propio beneficio y logran eludir las herramientas de seguridad tradicionales que no descifran e inspeccionan el tráfico, dado que menos de la mitad de los dispositivos de seguridad de red inspeccionan el tráfico SSL/TLS. Asista a este webinar para informarse de:

      - Las tendencias globales de cifrado y cómo mejorar su planteamiento del cifrado
      - Qué ataques ocultan malware dentro de los túneles cifrados
      - Cómo lograr la visibilidad de su tráfico SSL/TLS
      - Cómo abordar las preocupaciones de rendimiento de SSL/TLS

      Al asistir a este webinar, tus datos personales serán compartidos con F5 y tratados de acuerdo con la Política de Privacidad de F5 (https://f5.com/about-us/policies/privacy-policy).

      Read more >
    • Comment obtenir la visibilité et le contrôle sur SSL / TLS?
      Comment obtenir la visibilité et le contrôle sur SSL / TLS? Tewfik Megherbi – Field Systems Engineer, F5 Networks Recorded: Jun 29 2017 10:00 am UTC 70 mins
    • Les protocoles SSL et TLS sont devenus la norme en matière de gestion du trafic Internet dans son ensemble. Parallèlement à cela, les solutions de contrôle de la sécurité manquent cruellement de visibilité. Les cybercriminels détournent les technologies de chiffrement à leur avantage, en contournant les outils de sécurité traditionnels qui ne déchiffrent pas le trafic et ne le contrôlent pas. Ainsi, moins de la moitié des équipements de sécurité réseau contrôlent le trafic SSL/TLS. Participez avec nous à ce séminaire en ligne pour en savoir plus sur les sujets suivants :

      - Tendances mondiales en matière de chiffrement et renforcement de votre position dans ce domaine
      - Identification des attaques masquant des programmes malveillants au sein de tunnels chiffrés
      - Amélioration de la visibilité sur le trafic SSL/TLS
      - Gestion des problèmes de performances de SSL/TLS

      En suivant ce webinar, vos données personnelles seront partagées avec F5 et seront traitées en accord avec la politique de confidentialité de F5 (https://f5.com/about-us/policies/privacy-policy).

      Read more >
    • SSL Best Practices: Domain Protection
      SSL Best Practices: Domain Protection Mark Giannotii, Entrust Recorded: Jun 28 2017 5:55 pm UTC 56 mins
    • Phishing attacks are dangerous to your customers and could be detrimental to your brand. Securing your website and protecting your business are the cornerstone of Entrust SSL Best Practices. Join us for a complimentary webinar that covers key best practices for protecting your domain phishing attacks against the customer’s clientele and unsuspecting internet users.

      We will discuss:

      •The Definition of a Trusted CA: Learn what controls a trusted Certificate Authority (CA) has in place to ensure that unauthorized administrator cannot acquire a certificate for your organization’s brand name.
      •Domain Protection: Discuss how you can prevent another CA from issuing certificates for your domain and detect previously issued certificates.
      •Domain and Brand Reputation: Explore subjects such as certificate transparency, Microsoft’s certificate reputation, HTTP public key pinning and certification authority authorization.

      Read more >